Detecting Identity Based Attack In MIMO System Using Link Signature In Wireless Network

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 03 | Mar -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

Detecting Identity Based Attack in MIMO System Using Link Signature in Wireless Network Kanimozhi.V1, keerthana.D2,Sri Devi.G3,Panimalar.S4 1,2,3Dept.

of Computer Science & Engineering, Panimalar Institute Of Technology, Chennai,Tamilnadu, India ,Assistant Professor, Dept. of Computer Science & Engineering, Panimalar Institute Of Technology, Chennai,Tamilnadu, India

4S.Panimalar

-----------------------------------------***-----------------------------------------Abstract-Wireless link signature is becoming increasingly important as wireless devices between a transmitter and a receiver to provide authentication of wireless signals. This project identifies a new attack, called mimicry attack, against the existing wireless link signature schemes. It is assumed in that an attacker “cannot ‘spoof’ an arbitrary link signature” and that the attacker “will not have the same link signature at the receiver unless it is at exactly the same location as the legitimate transmitter”. The mimicry attack is extended to multiple-input multipleoutput(MIMO) systems. To defend against the mimicry attack, this project has the construction for wireless link signature, called time-synched link signature, by integrating cryptographic protection and time factor into wireless physical layer features. This link signature is effective in physical layer authentication. KeyWords: 1.MimoSystem,2.Link Signature,3.Time-

channel characteristics between a transmitter and a receiver to provide authentication of the wireless channel.Thereare three link signature schemes . The link signature has been recognized as a physical layer authentication mechanism for applications where wireless channel characteristics is unique for individual nodes . 2.LITERATURE SURVEY: Location distinction is the ability to determine when a device has changed its position. We explore the opportunity to use sophisticated PHY-layer measurements in wireless net- working systems for location distinction. We first compare two existing location distinction methods one based on channel gains of multi-tonal probes, and another on channel impulse response. Next, we combine the benefits of these two methods to develop a new link measurement that we call the complex temporal signature. We use a 2.4 GHz link measurement data set, obtained from CRAWDAD , to evaluate the three location distinction methods. We find that the complex temporal signature method performs significantly better compared to the existing methods. We also perform new measurements to understand and model the temporal behavior of link signatures over time. We intergrate our model in our location distinction mechanism and significantly reduce the probability of false alarms due to temporal variations of link signatures.

Synched

1.INTRODUCTION Wireless physical layer security is becoming increasingly important as wireless devices are more and more pervasive and adopted in critical applications. There have been multiple proposals in recent years to provide enhanced wireless security using physical layer characteristics, including fingerprinting wireless devices, authenticating and identifying wireless channels , and deriving secret keys from wireless channel features only observable to the communicating parties . Among the recent advances in wireless physical layer security is link signature. Link signature uses the unique wireless © 2017, IRJET

|

Impact Factor value: 5.181

3.EXISTING SYSTEM: Existing techniques using non-cryptographic approaches to authenticate wireless transmitters can be classified into three categories: software |

ISO 9001:2008 Certified Journal

|

Page 1019


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.